Software Seminar Series (S3)

Abstract: Predicate encodings are information-theoretic primitives that can be transformed generically into predicate encryption s...


Abstract: Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it is rapidly g...


Abstract: Modern computer architectures share physical resources between different programs in order to increase area-, energy-, a...


Abstract: Bridges are onion routers in the Tor Network whose IP addresses are not public. So far, no global security analysis of T...


Artem Khyzha

Thursday, November 3, 2016

Artem Khyzha, PhD Student, IMDEA Software Institute

Proving linearizability using partial orders

Abstract: Linearizability is the commonly accepted notion of correctness for concurrent data structures. It requires that any exec...


Maria Garcia De La Banda

Tuesday, October 25, 2016

Maria Garcia De La Banda, Visiting Faculty Professor, IMDEA Software Institute

Learning from learning solvers

Abstract: Modern constraint programming solvers incorporate SAT-style learning, where the decisions that lead to a failure are rec...


Bogdan Kulynych

Tuesday, October 18, 2016

Bogdan Kulynych, Predoctoral Researcher, IMDEA Software Institute

Privacy-preserving statistics and machine learning

Abstract: In this talk, Bogdan will discuss his experience as an intern at Google. The first part of the talk is going to be about...


John Gallagher

Tuesday, October 4, 2016

John Gallagher, Professor, Roskilde University, Denmark and IMDEA Software Institute, Spain

Finite tree automata in Horn clause analysis and verification

Abstract: Successful Horn clause derivations are finite trees and this leads to a straightforward correspondence between a set of ...


Richard Rivera

Thursday, July 21, 2016

Richard Rivera, PhD Student, IMDEA Software Institute

AVCLASS: A Tool for Massive Malware Labeling

Abstract: Labeling a malicious executable as a variant of a known family is important for security applications such as triage, li...


Abstract: Potentially unwanted programs (PUP) such as adware and rogueware, while not outright malicious, exhibit intrusive behavi...


Abstract: We explore the effectiveness of abstract interpretation in detecting parts of program specifications that can be simplif...


Isabel Garcia

Tuesday, June 14, 2016

Isabel Garcia, Research Intern, IMDEA Software Institute

Abstract Code Browsing

Abstract: Programmers currently enjoy access to a very high number of code repositories and libraries of ever increasing size. The...


Miguel Ambrona

Tuesday, June 7, 2016

Miguel Ambrona, PhD Student, IMDEA Software Institute

Attribute-Based Encryption (ABE)

Abstract: The talk will be an overview of the state of the art in Attribute-Based Encryption. Attribute-based encryption (ABE) is ...


Pablo Nogueira

Tuesday, May 10, 2016

Pablo Nogueira, Post-doctoral Researcher, IMDEA Software Institute

No Solvable Lambda-Value Term Left Behind

Abstract: What’s solvability? For some terms of the pure lambda calculus reduction does not terminate. But these non-termina...


German Delbianco

Tuesday, April 26, 2016

German Delbianco, PhD Student, IMDEA Software Institute

Concurrent Data Structures Linked in Time

Abstract: Arguments about linearizability of a concurrent data structure are typically carried out by specifying the linearization...


Giovanni Bernardi

Tuesday, March 15, 2016

Giovanni Bernardi, Post-doctoral Researcher, IMDEA Software Institute

Robustness against Parallel Snapshot Isolation

Abstract: Modern distributed systems often rely on databases that achieve scalability by providing only weak guarantees about the ...


Abstract: The security of cryptographic libraries relies on both the security of the underlying cryptographic primitives and their...


Abstract: In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize th...


Andrea Cerone

Tuesday, January 26, 2016

Andrea Cerone, Post-doctoral Researcher, IMDEA Software Institute

Analysing Transactional Consistency Models

Abstract: To boost performance, modern transactional systems provide weaker consistency guarantees than those defined by serialisa...


Alley Stoughton

Tuesday, January 19, 2016

Alley Stoughton, Researcher, IMDEA Software Institute

You Sank My Battleship! A Case Study in Secure Programming

Abstract: I’ll report on a case study in secure programming, focusing on the design, implementation and auditing of programs...